Skip to main content
Erschienen in: Journal of Digital Imaging 1/2008

01.03.2008

Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique

verfasst von: Jeffery H. K. Wu, Ruey-Feng Chang, Chii-Jen Chen, Ching-Lin Wang, Ta-Hsun Kuo, Woo Kyung Moon, Dar-Ren Chen

Erschienen in: Journal of Imaging Informatics in Medicine | Ausgabe 1/2008

Einloggen, um Zugang zu erhalten

Abstract

Digital medical images are very easy to be modified for illegal purposes. For example, microcalcification in mammography is an important diagnostic clue, and it can be wiped off intentionally for insurance purposes or added intentionally into a normal mammography. In this paper, we proposed two methods to tamper detection and recovery for a medical image. A 1024 × 1024 x-ray mammogram was chosen to test the ability of tamper detection and recovery. At first, a medical image is divided into several blocks. For each block, an adaptive robust digital watermarking method combined with the modulo operation is used to hide both the authentication message and the recovery information. In the first method, each block is embedded with the authentication message and the recovery information of other blocks. Because the recovered block is too small and excessively compressed, the concept of region of interest (ROI) is introduced into the second method. If there are no tampered blocks, the original image can be obtained with only the stego image. When the ROI, such as microcalcification in mammography, is tampered with, an approximate image will be obtained from other blocks. From the experimental results, the proposed near-lossless method is proven to effectively detect a tampered medical image and recover the original ROI image. In this study, an adaptive robust digital watermarking method combined with the operation of modulo 256 was chosen to achieve information hiding and image authentication. With the proposal method, any random changes on the stego image will be detected in high probability.
Literatur
1.
Zurück zum Zitat Hsu C-T, Wu J-L: Multiresolution watermarking for digital images. IEEE Trans Circuit Syst–II 45:1097–1101, 1998CrossRef Hsu C-T, Wu J-L: Multiresolution watermarking for digital images. IEEE Trans Circuit Syst–II 45:1097–1101, 1998CrossRef
2.
Zurück zum Zitat Podilchuk CI, Zeng W: Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16:525–539, 1998CrossRef Podilchuk CI, Zeng W: Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16:525–539, 1998CrossRef
3.
Zurück zum Zitat Pitas I: A method for watermark casting on digital images. IEEE Trans Circuits Syst Video Technol 8:775–780, 1998CrossRef Pitas I: A method for watermark casting on digital images. IEEE Trans Circuits Syst Video Technol 8:775–780, 1998CrossRef
4.
Zurück zum Zitat Wei ZH, Qin P, Fu YQ: Perceptual digital watermark of images using wavelet transform. IEEE Trans Consum Electron 44:1267–1272, 1998CrossRef Wei ZH, Qin P, Fu YQ: Perceptual digital watermark of images using wavelet transform. IEEE Trans Consum Electron 44:1267–1272, 1998CrossRef
5.
Zurück zum Zitat Hsu C-T, Wu J-L: Hidden digital watermarks in images. IEEE Trans Image Process 8:58–68, 1999PubMedCrossRef Hsu C-T, Wu J-L: Hidden digital watermarks in images. IEEE Trans Image Process 8:58–68, 1999PubMedCrossRef
6.
Zurück zum Zitat Lee C-H, Lee Y-K: An adaptive digital image watermarking technique for copyright protection. IEEE Trans Consum Electron 45:1005–1015, 1999CrossRef Lee C-H, Lee Y-K: An adaptive digital image watermarking technique for copyright protection. IEEE Trans Consum Electron 45:1005–1015, 1999CrossRef
7.
Zurück zum Zitat Ng KS, Cheng LM, Cheng LL, Wang MK: Adaptive watermarking by using pixel position shifting technique. IEEE Trans Consum Electron 45:1057–1064, 1999CrossRef Ng KS, Cheng LM, Cheng LL, Wang MK: Adaptive watermarking by using pixel position shifting technique. IEEE Trans Consum Electron 45:1057–1064, 1999CrossRef
8.
Zurück zum Zitat Hwang M-S, Chang C-C, Hwang K-F: A watermarking technique based on one-way hash functions. IEEE Trans Consum Electron 45:286–294, 1999CrossRef Hwang M-S, Chang C-C, Hwang K-F: A watermarking technique based on one-way hash functions. IEEE Trans Consum Electron 45:286–294, 1999CrossRef
9.
Zurück zum Zitat Fridrich J, Goljan M, Du R: Invertible authentication. In: Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Content III. San Jose, CA, 2001, pp 197–208 Fridrich J, Goljan M, Du R: Invertible authentication. In: Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Content III. San Jose, CA, 2001, pp 197–208
10.
Zurück zum Zitat Celik MU, Sharma G, Tekalp AM, Saber E: Reversible data hiding. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 157–160 Celik MU, Sharma G, Tekalp AM, Saber E: Reversible data hiding. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 157–160
11.
Zurück zum Zitat Goljan M, Fridrich J, Du R: Distortion-free data embedding. In: The 4th Information Hiding Workshop. Pittsburgh, Pennsylvania, 2001, pp 27-41 Goljan M, Fridrich J, Du R: Distortion-free data embedding. In: The 4th Information Hiding Workshop. Pittsburgh, Pennsylvania, 2001, pp 27-41
12.
Zurück zum Zitat Fridrich J, Goljan M, Du R: Invertible authentication watermark for JPEG images. In: Information Technology: Coding and Computing. Las Vegas, Nevada, 2001, pp 223–227 Fridrich J, Goljan M, Du R: Invertible authentication watermark for JPEG images. In: Information Technology: Coding and Computing. Las Vegas, Nevada, 2001, pp 223–227
13.
Zurück zum Zitat Vleeschouwer CD, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105, 2003CrossRef Vleeschouwer CD, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105, 2003CrossRef
14.
Zurück zum Zitat Gokturk SB, Tomasi C, Girod B, Beaulieu C: Medical image compression based on region of interest, with application to colon CT images. In: Annual Reports of the Research Reactor Institute, Kyoto University. Istanbul, Turkey, 2001, pp 2453–2356 Gokturk SB, Tomasi C, Girod B, Beaulieu C: Medical image compression based on region of interest, with application to colon CT images. In: Annual Reports of the Research Reactor Institute, Kyoto University. Istanbul, Turkey, 2001, pp 2453–2356
15.
Zurück zum Zitat Fridrich J, Goljan M, Du R: Lossless data embedding—new paradigm in digital watermarking. J Appl Signal Process 185–196, 2002 Fridrich J, Goljan M, Du R: Lossless data embedding—new paradigm in digital watermarking. J Appl Signal Process 185–196, 2002
16.
Zurück zum Zitat Fridrich J, Goljan M, Du R: Lossless data embedding for all image formats. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2002, pp 572–583 Fridrich J, Goljan M, Du R: Lossless data embedding for all image formats. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2002, pp 572–583
17.
Zurück zum Zitat Du R, Fridrich J: Lossless authentication of MPEG-2 video. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 889–892 Du R, Fridrich J: Lossless authentication of MPEG-2 video. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 889–892
18.
Zurück zum Zitat Welch TA: A technique for high-performance data-compression. IEEE Comput 17:8–19, 1984 Welch TA: A technique for high-performance data-compression. IEEE Comput 17:8–19, 1984
19.
Zurück zum Zitat Weinberger MJ, Rissanen JJ, Arps B: Applications of universal context modeling to lossless compression of gray-scale images. IEEE Trans Image Process 5:575–586, 1996PubMedCrossRef Weinberger MJ, Rissanen JJ, Arps B: Applications of universal context modeling to lossless compression of gray-scale images. IEEE Trans Image Process 5:575–586, 1996PubMedCrossRef
20.
Zurück zum Zitat Shen L, Rangayyan RM: Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6:198–207, 1997CrossRef Shen L, Rangayyan RM: Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6:198–207, 1997CrossRef
21.
Zurück zum Zitat Fridrich J: Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284, 1998CrossRef Fridrich J: Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284, 1998CrossRef
22.
Zurück zum Zitat Herrigel A, Ruanidh JO, Petersen H, Pereira S, Pun T: Secure copyright protection techniques for digital images. In: Information Hiding Workshop. Portland, Oregon, 1998, pp 169–190 Herrigel A, Ruanidh JO, Petersen H, Pereira S, Pun T: Secure copyright protection techniques for digital images. In: Information Hiding Workshop. Portland, Oregon, 1998, pp 169–190
23.
Zurück zum Zitat Friedman GL: The trustworthy digital camera—restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910, 1993CrossRef Friedman GL: The trustworthy digital camera—restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910, 1993CrossRef
24.
Zurück zum Zitat Schneider M, Chang S-F: A robust content based digital signature for image authentication. In: IEEE International Conference on Image Processing. Lausanne, Switzerland, 1996, pp 227–230 Schneider M, Chang S-F: A robust content based digital signature for image authentication. In: IEEE International Conference on Image Processing. Lausanne, Switzerland, 1996, pp 227–230
25.
Zurück zum Zitat Queluz MP: Towards robust, content based techniques for image authentication. In: IEEE Workshop on Multimedia Signal Processing. Los Angeles, CA, 1998, pp 297–302 Queluz MP: Towards robust, content based techniques for image authentication. In: IEEE Workshop on Multimedia Signal Processing. Los Angeles, CA, 1998, pp 297–302
26.
Zurück zum Zitat Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601, 2001PubMedCrossRef Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601, 2001PubMedCrossRef
27.
Zurück zum Zitat Bhattacharjee S, Kutter M: Compression tolerant image authentication. In: IEEE International Conference on Image Processing. Chicago, IL, 1998, pp 435–439 Bhattacharjee S, Kutter M: Compression tolerant image authentication. In: IEEE International Conference on Image Processing. Chicago, IL, 1998, pp 435–439
28.
Zurück zum Zitat Lu C-S, Liao H-YM: Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10:1579–1592, 2001PubMedCrossRef Lu C-S, Liao H-YM: Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10:1579–1592, 2001PubMedCrossRef
29.
Zurück zum Zitat Yu G-J, Lu C-S, Laio H-YM: Mean-quantization-based fragile watermarking for image authentication. Opt Eng 40:1396–1408, 2001CrossRef Yu G-J, Lu C-S, Laio H-YM: Mean-quantization-based fragile watermarking for image authentication. Opt Eng 40:1396–1408, 2001CrossRef
30.
Zurück zum Zitat Kundur D, Hatzinakos D: Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87:1167–1180, 1999CrossRef Kundur D, Hatzinakos D: Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87:1167–1180, 1999CrossRef
31.
Zurück zum Zitat Podilchuk CI, Delp EJ: Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18:33–46, 2001CrossRef Podilchuk CI, Delp EJ: Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18:33–46, 2001CrossRef
32.
Zurück zum Zitat Lin ET, Podilchuk CI, Delp EJ: Detection of image alterations using semi-fragile watermarks. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2000, pp 152–163 Lin ET, Podilchuk CI, Delp EJ: Detection of image alterations using semi-fragile watermarks. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2000, pp 152–163
33.
Zurück zum Zitat Tefas A, Pitas I: Image authentication and tamper proofing using mathematical morphology. In: Proceedings of European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000, vol 3, pp 1681–1684 Tefas A, Pitas I: Image authentication and tamper proofing using mathematical morphology. In: Proceedings of European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000, vol 3, pp 1681–1684
34.
Zurück zum Zitat Lee YL, Kim HC, Park HW: Blocking effect reduction of JPEG images by signal adaptive filtering. IEEE Trans Image Process 7:229–234, 1998PubMedCrossRef Lee YL, Kim HC, Park HW: Blocking effect reduction of JPEG images by signal adaptive filtering. IEEE Trans Image Process 7:229–234, 1998PubMedCrossRef
35.
Zurück zum Zitat Han Y-H, Leou J-J: Detection and correction of transmission errors in JPEG images. IEEE Trans Circuits Syst Video Technol 8:221–231, 1998CrossRef Han Y-H, Leou J-J: Detection and correction of transmission errors in JPEG images. IEEE Trans Circuits Syst Video Technol 8:221–231, 1998CrossRef
36.
Zurück zum Zitat Konstantinides K, Bhaskaran V, Beretta G: Image sharpening in the JPEG domain. IEEE Trans Image Process 8:874–878, 1999PubMedCrossRef Konstantinides K, Bhaskaran V, Beretta G: Image sharpening in the JPEG domain. IEEE Trans Image Process 8:874–878, 1999PubMedCrossRef
37.
Zurück zum Zitat In J, Shirani S, Kossentini F: On RD optimized progressive image coding using JPEG. IEEE Trans Image Process 8:1630–1638, 1999PubMedCrossRef In J, Shirani S, Kossentini F: On RD optimized progressive image coding using JPEG. IEEE Trans Image Process 8:1630–1638, 1999PubMedCrossRef
38.
Zurück zum Zitat Cheng H-D, Lui YM, Freimanis RI: A novel approach to microcalcification detection using fuzzy logic technique. IEEE Trans Med Imag 17:442–450, 1998CrossRef Cheng H-D, Lui YM, Freimanis RI: A novel approach to microcalcification detection using fuzzy logic technique. IEEE Trans Med Imag 17:442–450, 1998CrossRef
Metadaten
Titel
Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique
verfasst von
Jeffery H. K. Wu
Ruey-Feng Chang
Chii-Jen Chen
Ching-Lin Wang
Ta-Hsun Kuo
Woo Kyung Moon
Dar-Ren Chen
Publikationsdatum
01.03.2008
Verlag
Springer-Verlag
Erschienen in
Journal of Imaging Informatics in Medicine / Ausgabe 1/2008
Print ISSN: 2948-2925
Elektronische ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-007-9011-1

Weitere Artikel der Ausgabe 1/2008

Journal of Digital Imaging 1/2008 Zur Ausgabe

Update Radiologie

Bestellen Sie unseren Fach-Newsletter und bleiben Sie gut informiert.